fletcher-cyber-security-engineerManage and enforce least-privilege execution, approval-based elevation, port and egress monitoring, and ISO 27001/NIST compliance reporting for OpenClaw secu...
Install via ClawdBot CLI:
clawdbot install fletcherfrimpong/fletcher-cyber-security-engineerGrade Fair — based on market validation, documentation quality, package completeness, maintenance status, and authenticity signals.
Generated Mar 22, 2026
Enforce least-privilege execution and approval workflows in CI/CD pipelines to prevent unauthorized root commands during deployments. Automatically log all elevated actions and expire idle sessions to comply with ISO 27001 access control requirements.
Monitor network ports and egress connections to detect unapproved exposures, ensuring alignment with NIST frameworks. Generate compliance reports with mitigations for regulatory audits in banking or fintech environments.
Implement idle timeout controls and command allowlists to secure patient data systems. Use preflight checks and violation notifications to maintain HIPAA and ISO 27001 standards for electronic health records.
Continuously assess listening ports and outbound traffic against approved baselines in cloud environments. Flag insecure exposures and provide actionable mitigations to reduce attack surfaces in multi-tenant setups.
Leverage audit logging and live assessment scripts to trace privileged actions during security incidents. Scope elevations to minimal commands and enforce session IDs for forensic analysis in breach investigations.
Offer this skill as part of a subscription-based security platform, providing automated compliance reporting and privileged access controls. Revenue is generated through monthly or annual licenses for enterprises.
Provide professional services to integrate this skill into client environments, customizing policies and workflows. Revenue comes from project-based fees and ongoing support contracts.
Bundle this skill with managed monitoring and response services, using its scripts for real-time violation detection and mitigation. Revenue is driven by service-level agreements and per-device pricing.
💬 Integration Tip
Start by running preflight_check.py to assess current state, then configure templates like command-policy.template.json before enabling guarded_privileged_exec.py for production use.
Scored Apr 19, 2026
Information Security Management System (ISMS) audit expert for ISO 27001 compliance verification, security control assessment, and certification support. Use...
ISO 13485 internal audit expertise for medical device QMS. Covers audit planning, execution, nonconformity classification, and CAPA verification. Use for int...
Safely triage and remediate GitHub dependency hygiene issues with explicit guardrails. Use when Dependabot PRs fail, pnpm lockfiles break, transitive vulnerabilities appear (e.g., glob/lodash/brace-expansion), or CI/Vercel fails due to dependency resolution. Prioritize low-risk fixes, branch+PR workflow, and plain-English explanations.
Audit an iOS app repo (Swift/Xcode or React Native/Expo) for App Store compliance and release readiness; output a pass/warn/fail report and publish checklist.
Local-first, event-driven RAG for commercial real estate audit & investigation case folders. Index a case directory named like "项目问题编号__标题" (with stage subfolders such as 01_policy_basis/02_process/04_settlement_payment) and query it with citations (file:// links + PDF
Audit project dependencies for known vulnerabilities (CVEs). Supports npm, pip, Cargo, and Go. Zero API keys required. Safe-by-default: report-only mode, fix...